Encryption ‘back doors’ are a bad idea - FT中文网
登录×
电子邮件/用户名
密码
记住我
请输入邮箱和密码进行绑定操作:
请输入手机号码,通过短信验证(目前仅支持中国大陆地区的手机号):
请您阅读我们的用户注册协议隐私权保护政策,点击下方按钮即视为您接受。
网络安全

Encryption ‘back doors’ are a bad idea

UK pressure on Apple for data access could leave the majority less safe
00:00

{"text":[[{"start":8.71,"text":"How much authority should democratic governments have to “snoop” on citizens’ online data and communications? "},{"start":14.338999999999999,"text":"The UK government has used new legal powers to demand that Apple create a “back door” enabling law enforcement bodies to access users’ encrypted data uploaded to the cloud. "},{"start":23.232,"text":"Apple has responded instead by withdrawing from Britain its most secure cloud storage service — which uses end-to-end encryption that Apple says means even it cannot access the data. "}],[{"start":33.339999999999996,"text":"Britain is not alone. "},{"start":35.232,"text":"Sweden’s government wants encrypted messaging apps such as Signal and WhatsApp to open a similar back door. "},{"start":40.711999999999996,"text":"Signal is threatening to leave Sweden if this becomes law. "},{"start":43.928999999999995,"text":"The cases amount to the biggest confrontation yet between western governments’ understandable desire to police crimes such as terrorism and child sex abuse online, and the gold-standard encryption now widely used to protect user privacy in messaging apps and the cloud. "}],[{"start":58.36,"text":"Both cases echo the battle when the FBI tried to compel Apple to help it break into an iPhone used by a terrorist in a California shooting in 2015. "},{"start":66.952,"text":"Apple said if it created an iPhone back door for the FBI, malicious actors might discover it and use it to crack other phones. "},{"start":73.794,"text":"A hacking firm eventually unlocked the phone for the FBI, ending the stand-off. "}],[{"start":78.82,"text":"The British and Swedish demands are much wider. "},{"start":81.699,"text":"Using its Investigatory Powers Act — which critics have dubbed a “Snoopers’ Charter” — the UK Home Office has issued a notice requiring Apple to allow British law enforcement, armed with a court order, to tap encrypted back-ups and other cloud data, anywhere in the world. "}],[{"start":96.75,"text":"But the underlying dilemma is the same. "},{"start":99.379,"text":"When millions of people are sending or storing online sensitive data on, say, their finances or health, data protection is paramount. "},{"start":107.034,"text":"End-to-end encryption, where only the user and not the service provider holds the key, is the best safeguard. "}],[{"start":113.92,"text":"Most cyber security experts argue government bodies cannot be given access without creating a vulnerability that hackers, including authoritarian states, could abuse. "},{"start":123.174,"text":"Something like this has already happened. "},{"start":125.304,"text":"In an attack called “Salt Typhoon”, Chinese hackers last year exploited a US government-mandated back door in US telecoms networks to access call and text data and even phone calls of top politicians. "}],[{"start":137.38,"text":"In the UK, some 239 civil society groups, companies and cyber security experts have called on the government to rescind its demand to Apple, saying it “jeopardises the security and privacy of millions”. "},{"start":149.347,"text":"Using similar arguments, bipartisan members of two US congressional oversight committees have asked Tulsi Gabbard, the new national intelligence director, to demand that the UK retracts its order — and to consider limiting US-UK intelligence sharing if it does not. "}],[{"start":164.1,"text":"This is without doubt a thorny issue. "},{"start":166.429,"text":"No one wishes terrorists and child abusers to be able to evade detection. "},{"start":170.48399999999998,"text":"Some UK security officials have insisted privacy protections can coexist with “exceptional lawful access”, and argued that tech companies could find a clever workaround. "},{"start":179.389,"text":"Tech experts counter that no foolproof compromise yet exists. "}],[{"start":183.38,"text":"But almost all big tech companies rightly co-operate with legitimate law enforcement requests that do not involve “back doors” on a routine basis; Apple’s latest UK transparency report shows it complied with 93 per cent of emergency requests. "},{"start":196.384,"text":"If a solution is developed enabling this to happen safely with end-to-end encryption, co-operation should extend into this area too. "},{"start":203.264,"text":"For now, though, governments should treat this kind of protection as a common good. "},{"start":207.819,"text":"Efforts to police the criminal minority should not undermine the safety and privacy of the law-abiding majority. "}],[{"start":213.26999999999998,"text":""}]],"url":"https://creatives.ftmailbox.cn/album/194311-1740539587.mp3"}

版权声明:本文版权归FT中文网所有,未经允许任何单位或个人不得转载,复制或以任何其他方式使用本文全部或部分,侵权必究。

共和党地方选举失利 特朗普面临经济问题压力

在纽约、弗吉尼亚和新泽西遭遇失利后,共和党敦促总统将重心放在提升民众的生活负担能力上。

为何拉丁美洲离不开石油和天然气

随着第30届联合国气候大会临近,巴西和哥伦比亚为发展中国家提供了截然不同的“公正能源转型”愿景。

米莱中期选举胜利后拒绝让比索自由浮动

这位秉承自由意志主义的总统誓言将加速其自由市场改革,并加深与特朗普的联盟。

尽管关税施压,美国“三大”汽车制造商前景改善

福特汽车、通用汽车和斯泰兰蒂斯迅速采取行动以抵消贸易战的影响,并从纾困措施中受益。
1天前

俄罗斯为苏联时代“傻瓜炸弹”加装喷气发动机

俄军的滑翔炸弹如今可打击最远200公里外的乌克兰目标。
2天前

日本正适应与美国关系的新局面

曾经以利他主义和合作为基础的伙伴关系,如今已演变为交易型伙伴关系。
设置字号×
最小
较小
默认
较大
最大
分享×